BSidesKC Security Conference | April 20-21, 2018 | Cerner Innovations Campus, KC, MO


CFP is closed. We're currently reviewing the submissions. Thanks to everyone who submitted!


BSidesKC aims to provide a diverse range of talks covering both conventional cybersecurity topics as well as emerging threats and technologies. Topics can range from completed or near-complete research, tool development, best practices, lessons learned and experiences. Generally speaking, if it deals with security, it is applicable. BSides conferences are designed to be conversations and should allow for interaction with the attendees, as lectures are nice from time to time, but new insights or ancillary work often comes from dialogue. 

Why should you consider presenting?

  • Increase the overall strength of our community by sharing your knowledge, best practices and experiences with peers and emerging professionals
  • Have the opportunity to share your interests and network with other like-minded individuals
  • Develop collaborative relationships and crowd source new ideas and solutions
  • Immediate feedback from your audience
  • BSidesKC provides all attendees surveys for every talk. This helps our speakers get better!

About Presentations

Proposals will be considered for the following types of presentations:

  • 10 minutes – For those new to presenting, or have partial research topic, looking for feedback on a topic.
  • 25 or 50-minutes – For the seasoned presenter or maybe you just like to talk a lot.
  • Student talks (K-12) - Flexible timeslots from 5 to 30 minutes
  • Discussions panels – Have an idea for a discussion panel, we’re open to the idea.

BSidesKC 2018 will consist of 3 talking tracks, 2 keynotes (one morning and one afternoon), and potentially a panel discussion. The content of the tracks below will be determined by our open Call For Papers/Proposals.

Submit a CFP

Submit a Student CFP (K-12 only)

Topics of Interest (Not limited to):

  • IOT
  • Vulnerabilities
  • Telecommunications
  • Threat Intelligence
  • Incident Handling & Incident Response
  • Digital Forensics
  • Network Infrastructure
  • Critical Infrastructure
  • Exploits
  • Reverse Engineering
  • Tool Development
  • Secure Coding
  • Application Security
  • Database Security
  • Wireless
  • New Technologies
  • Cryptography
  • Mobile Security
  • Malware
  • Monitoring and Analysis
  • Analytics


  • December 11, 2017: CFP will open
  • February 11, 2018: CFP closes
  • February 24, 2018: End of review and scoring period
  • March 3, 2018: Accepted speaker will be notified
  • March 17, 2018: Agenda and schedule release
  • April 21, 2018: Day of the conference